mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
204 lines
5.1 KiB
Go
204 lines
5.1 KiB
Go
// Copyright 2016 CoreOS, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package clientv3
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
"net/url"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/coreos/etcd/Godeps/_workspace/src/google.golang.org/grpc"
|
|
"github.com/coreos/etcd/Godeps/_workspace/src/google.golang.org/grpc/credentials"
|
|
"github.com/coreos/etcd/pkg/transport"
|
|
)
|
|
|
|
var (
|
|
ErrNoAvailableEndpoints = errors.New("etcdclient: no available endpoints")
|
|
)
|
|
|
|
// Client provides and manages an etcd v3 client session.
|
|
type Client struct {
|
|
Cluster
|
|
KV
|
|
Lease
|
|
Watcher
|
|
|
|
conn *grpc.ClientConn
|
|
cfg Config
|
|
creds *credentials.TransportAuthenticator
|
|
mu sync.RWMutex // protects connection selection and error list
|
|
errors []error // errors passed to retryConnection
|
|
}
|
|
|
|
// EndpointDialer is a policy for choosing which endpoint to dial next
|
|
type EndpointDialer func(*Client) (*grpc.ClientConn, error)
|
|
|
|
type Config struct {
|
|
// Endpoints is a list of URLs
|
|
Endpoints []string
|
|
|
|
// RetryDialer chooses the next endpoint to use
|
|
RetryDialer EndpointDialer
|
|
|
|
// DialTimeout is the timeout for failing to establish a connection.
|
|
DialTimeout time.Duration
|
|
|
|
// TLS holds the client secure credentials, if any.
|
|
TLS *transport.TLSInfo
|
|
}
|
|
|
|
// New creates a new etcdv3 client from a given configuration.
|
|
func New(cfg Config) (*Client, error) {
|
|
if cfg.RetryDialer == nil {
|
|
cfg.RetryDialer = dialEndpointList
|
|
}
|
|
if len(cfg.Endpoints) == 0 {
|
|
return nil, ErrNoAvailableEndpoints
|
|
}
|
|
|
|
return newClient(&cfg)
|
|
}
|
|
|
|
// NewFromURL creates a new etcdv3 client from a URL.
|
|
func NewFromURL(url string) (*Client, error) {
|
|
return New(Config{Endpoints: []string{url}})
|
|
}
|
|
|
|
// Close shuts down the client's etcd connections.
|
|
func (c *Client) Close() error {
|
|
c.Watcher.Close()
|
|
c.Lease.Close()
|
|
return c.conn.Close()
|
|
}
|
|
|
|
// Endpoints lists the registered endpoints for the client.
|
|
func (c *Client) Endpoints() []string { return c.cfg.Endpoints }
|
|
|
|
// Errors returns all errors that have been observed since called last.
|
|
func (c *Client) Errors() (errs []error) {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
errs = c.errors
|
|
c.errors = nil
|
|
return errs
|
|
}
|
|
|
|
// Dial establishes a connection for a given endpoint using the client's config
|
|
func (c *Client) Dial(endpoint string) (*grpc.ClientConn, error) {
|
|
opts := []grpc.DialOption{
|
|
grpc.WithBlock(),
|
|
grpc.WithTimeout(c.cfg.DialTimeout),
|
|
}
|
|
if c.creds != nil {
|
|
opts = append(opts, grpc.WithTransportCredentials(*c.creds))
|
|
} else {
|
|
opts = append(opts, grpc.WithInsecure())
|
|
}
|
|
if url, uerr := url.Parse(endpoint); uerr == nil && url.Scheme == "unix" {
|
|
f := func(a string, t time.Duration) (net.Conn, error) {
|
|
return net.DialTimeout("unix", a, t)
|
|
}
|
|
// strip unix:// prefix so certs work
|
|
endpoint = url.Host
|
|
opts = append(opts, grpc.WithDialer(f))
|
|
}
|
|
|
|
conn, err := grpc.Dial(endpoint, opts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return conn, nil
|
|
}
|
|
|
|
func newClient(cfg *Config) (*Client, error) {
|
|
if cfg == nil {
|
|
cfg = &Config{RetryDialer: dialEndpointList}
|
|
}
|
|
var creds *credentials.TransportAuthenticator
|
|
if cfg.TLS != nil {
|
|
tlscfg, err := cfg.TLS.ClientConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
c := credentials.NewTLS(tlscfg)
|
|
creds = &c
|
|
}
|
|
// use a temporary skeleton client to bootstrap first connection
|
|
conn, err := cfg.RetryDialer(&Client{cfg: *cfg, creds: creds})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
client := &Client{
|
|
conn: conn,
|
|
cfg: *cfg,
|
|
creds: creds,
|
|
}
|
|
client.Cluster = NewCluster(client)
|
|
client.KV = NewKV(client)
|
|
client.Lease = NewLease(client)
|
|
client.Watcher = NewWatcher(client)
|
|
|
|
return client, nil
|
|
}
|
|
|
|
// ActiveConnection returns the current in-use connection
|
|
func (c *Client) ActiveConnection() *grpc.ClientConn {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.conn
|
|
}
|
|
|
|
// retryConnection establishes a new connection
|
|
func (c *Client) retryConnection(oldConn *grpc.ClientConn, err error) (*grpc.ClientConn, error) {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
if err != nil {
|
|
c.errors = append(c.errors, err)
|
|
}
|
|
if oldConn != c.conn {
|
|
// conn has already been updated
|
|
return c.conn, nil
|
|
}
|
|
conn, dialErr := c.cfg.RetryDialer(c)
|
|
if dialErr != nil {
|
|
c.errors = append(c.errors, dialErr)
|
|
return nil, dialErr
|
|
}
|
|
c.conn = conn
|
|
return c.conn, nil
|
|
}
|
|
|
|
// dialEndpointList attempts to connect to each endpoint in order until a
|
|
// connection is established.
|
|
func dialEndpointList(c *Client) (*grpc.ClientConn, error) {
|
|
var err error
|
|
for _, ep := range c.Endpoints() {
|
|
conn, curErr := c.Dial(ep)
|
|
if curErr != nil {
|
|
err = curErr
|
|
} else {
|
|
return conn, nil
|
|
}
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
func isRPCError(err error) bool {
|
|
return strings.HasPrefix(grpc.ErrorDesc(err), "etcdserver: ")
|
|
}
|